Security requirements deal with the protection of assets against unauthorized access (disclosure
or modification) and their availability to authorized users. Temporal constraints of history-based
access control policies ...

The paper presents a syntactical approach to designing
real-time distributed systems that can handle both continuous
time and discrete time models in a uniform logical
framework. We approximate continuous state variables
by ...